The Internal and External Algebraic Structure. of Complexity Classes. Lance Fortnow. Department of Computer Science. The University of Chicago
|
|
- Giles Allen
- 7 years ago
- Views:
Transcription
1 The Internal and External Algebraic Structure of Complexity Classes Lance Fortnow Department of Computer Science The University of Chicago 1100 East 58th Street Chicago, Illinois Abstract The report forms a bibliographic companion to a talk given at the Workshop on Algebraic Methods in Complexity Theory in Madras, India in December, In this report we will give many references that the reader may nd useful in studying the internal and external algebraic structure of complexity classes. 1 Introduction The external algebraic structure of a complexity class refers to algebraic closure properties that a class may possess such as the fact that #P functions are closed under addition and multiplication. The internal algebraic structure refers to how we can give alternate denitions of complexity classes based on building these classes from algebraic operations on top of very simple functions. For example #P functions in some sense look like low-degree polynomials over their inputs. This report will give a list of many references related to the internal and external algebraic structure of complexity classes. Please note that this report is in no sense complete and only meant as a place for interested researchers to nd some references in this area. 2 Study of Structure This section lists some papers that have studied algebraic structures of complexity classes in their own right. fortnow@cs.uchicago.edu. Partially supported by NSF grant CCR
2 Papers on Study of Structure [1] S. Arora, R. Impagliazzo, and U. Vazirani. Relativizing versus nonrelativizing techniques: The role of local checkability. Manuscript, University of California, Berkeley, [2] L. Babai and L. Fortnow. Arithmetization: A new method in structural complexity theory. Computational Complexity, 1(1):41{66, [3] S. Fenner, L. Fortnow, and S. Kurtz. Gap-denable counting classes. Journal of Computer and System Sciences, 48(1):116{148, [4] A. Razborov and S. Rudich. Natural proofs. In Proceedings of the 26th ACM Symposium on the Theory of Computing, pages 204{213. ACM, New York, External Structure In this section we list papers that prove theorems using the external structure of complexity theory. These theorems generally show that classes have certain closure properties based on their external algebraic structure. We feel that this study may prove more important as it may lead us to understand how to separate complexity classes. If two complexity classes do not have the same external algebraic structure then they cannot coincide. Papers Using External Structure [1] L. Babai and S. Moran. Arthur-Merlin games: a randomized proof system, and a hierarchy of complexity classes. Journal of Computer and System Sciences, 36(2):254{276, [2] R. Beigel and J. Gill. Counting classes: Thresholds, parity, mods, and fewness. Theoretical Computer Science, 103:3{23, [3] J. Cai, A. Condon, and R. Lipton. On bounded round multi-prover interactive proof systems. In Proceedings of the 5th IEEE Structure in Complexity Theory Conference, pages 45{54. IEEE, New York, [4] J. Cai, A. Condon, and R. Lipton. On games of incomplete information. Theoretical Computer Science, 103(1):25{38, [5] A. Condon and R. J. Lipton. On the complexity of space bounded interactive proofs. In Proceedings of the 30th IEEE Symposium on Foundations of Computer Science, pages 462{467. IEEE, New York, 1989.
3 [6] S. Goldwasser and M. Sipser. Private coins versus public coins in interactive proof systems. In S. Micali, editor, Randomness and Computation, volume 5 of Advances in Computing Research, pages 73{90. JAI Press, Greenwich, [7] U. Hertrampf. Relations among MOD classes (note). Theoretical Computer Science, 74:325{328, [8] R. Impagliazzo and D. Zuckerman. How to recycle random bits. In Proceedings of the 30th IEEE Symposium on Foundations of Computer Science, pages 248{253. IEEE, New York, [9] J. Kobler and U. Schoning and J. Toran. On counting and approximation. Acta Informatica, 26:363{379, [10] J. Kobler, U. Schoning, S. Toda, and J. Toran. Turing machines with few accepting computations and low sets for PP. Journal of Computer and System Sciences, 44(2):272{286, [11] J. Kobler, U. Schoning, and J. Toran. Graph isomorphism is low for PP. Computational Complexity, 2(4):301{330, [12] R. Mathon. A note on the graph isomorphism counting problem. Information Processing Letters, 8:131{132, [13] L. Valiant and V. Vazirani. NP is as easy as detecting unique solutions. Theoretical Computer Science, 47:85{93, Internal Structure In this section, we list papers that use the internal algebraic structure of complexity classes to prove theorems about these classes. By expressing a complexity class in terms of simple algebraic operations, we can often \simulate" that class using other means. Many important circuit complexity and interactive proof system results use this method. Papers Using Internal Structure [1] M. Abadi, J. Feigenbaum, and J. Kilian. On hiding information from an oracle. Journal of Computer and System Sciences, 39:21{50, [2] S. Arora, C. Lund, R. Motwani, M. Sudan, and M. Szegedy. Proof verication and hardness of approximation problems. In Proceedings of the 33rd IEEE Symposium on Foundations of Computer Science, pages 14{23. IEEE, New York, 1992.
4 [3] S. Arora and S. Safra. Probabilistic checking of proofs: A new characterization of NP. In Proceedings of the 33rd IEEE Symposium on Foundations of Computer Science, pages 2{13. IEEE, New York, [4] L. Babai, L. Fortnow, L. Levin, and M. Szegedy. Checking computations in polylogarithmic time. In Proceedings of the 23rd ACM Symposium on the Theory of Computing, pages 21{31. ACM, New York, [5] L. Babai, L. Fortnow, and C. Lund. Non-deterministic exponential time has two-prover interactive protocols. Computational Complexity, 1(1):3{ 40, [6] L. Babai, L. Fortnow, N. Nisan, and A. Wigderson. BPP has subexponential simulations unless EXPTIME has publishable proofs. In Proceedings of the 6th IEEE Structure in Complexity Theory Conference, pages 213{219. IEEE, New York, [7] D. Barrington. Bounded-width polynomial-size branching programs recognize exactly those languages in NC 1. Journal of Computer and System Sciences, 38(1):150{164, [8] D. Beaver and J. Feigenbaum. Hiding instances in multioracle queries. In Proceedings of the 7th Symposium on Theoretical Aspects of Computer Science, volume 415 of Lecture Notes in Computer Science, pages 37{48. Springer, Berlin, [9] D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway. Security with low communication overhead. In Advances in Cryptology { Crypto '90, volume 537 of Lecture Notes in Computer Science, pages 62{76. Springer, Berlin, [10] R. Beigel and J. Tarui. On ACC. In Proceedings of the 32nd IEEE Symposium on Foundations of Computer Science, pages 783{792. IEEE, [11] M. Blum, M. Luby, and R. Rubinfeld. Self-testing and self-correcting programs, with applications to numerical programs. Journal of Computer and System Sciences, 47:549{595, [12] D. Bovet, P. Crescenzi, and R. Silvestri. A uniform approach to dene complexity classes. Theoretical Computer Science, 104:263{283, [13] J. Cai and M. Furst. PSPACE survives constant-width bottlenecks. International Journal of Foundations of Computer Science, 2:67{76, [14] U. Feige, S. Goldwasser, L. Lovasz, S. Safra, and M. Szegedy. Approximating clique is almost NP-complete. In Proceedings of the 32nd IEEE
5 Symposium on Foundations of Computer Science, pages 2{12. IEEE, New York, [15] U. Feige and L. Lovasz. Two-prover one-round proof systems: Their power and their problems. In Proceedings of the 24th ACM Symposium on the Theory of Computing, pages 733{744. ACM, New York, [16] L. Fortnow and C. Lund. Interactive proof systems and alternating timespace complexity. Theoretical Computer Science A, 113:55{73, [17] N. Linial, Y. Mansour, and N. Nisan. Constant depth circuits, fourier transform, and learnability. Journal of the ACM, 40(3):607{620, [18] C. Lund, L. Fortnow, H. Karlo, and N. Nisan. Algebraic methods for interactive proof systems. Journal of the ACM, 39(4):859{868, [19] K. Mulmuley, U. Vazirani, and V. Vazirani. Matching is as easy as matrix inversion. Combinatorica, 7(1):105{113, [20] N. Nisan and M. Szegedy. On the degree of boolean functions as real polynomial. In Proceedings of the 24th ACM Symposium on the Theory of Computing, pages 462{467. ACM, New York, [21] N. Nisan and A. Wigderson. Hardness vs. randomness. In Proceedings of the 29th IEEE Symposium on Foundations of Computer Science, pages 2{11. IEEE, New York, [22] A. Razborov. Lower bounds of monotone complexity of the logical permanent function. Mathematical Notes of the Academy of Sciences of the USSR, 37:485{493, [23] A. Razborov. Lower bounds on the size of bounded depth circuits over a complete basis with logical addition. Mathematical Notes of the Academy of Sciences of the USSR, 41(4):333{338, [24] A. Razborov. Applications of matrix methods to the theory of lower bounds in computational complexity. Combinatorica, 10(1):81{93, [25] A. Shamir. IP = PSPACE. Journal of the ACM, 39(4):869{877, [26] A. Shen. IP = PSPACE: A simplied proof. Journal of the ACM, 39(4):878{880, 1992.
6 5 Internal and External Structure The papers that we nd most interesting use both the internal and external structure of complexity classes. These papers use the internal structure to \simulate" the classes and the external structure to keep these operations within the class. This section includes some of the most important results in complexity theory. Papers Using Both Internal and External Structure [1] E. Allender. A note on the power of threshold circuits. In Proceedings of the 30th IEEE Symposium on Foundations of Computer Science, pages 580{584. IEEE, New York, [2] R. Beigel. Perceptrons, PP and the polynomial hierarchy. In Proceedings of the 7th IEEE Structure in Complexity Theory Conference, pages 14{ 19. IEEE, New York, [3] R. Beigel, N. Reingold, and D. Spielman. The perceptron strikes back. In Proceedings of the 6th IEEE Structure in Complexity Theory Conference, pages 286{291. IEEE, New York, [4] R. Beigel, N. Reingold, and D. Spielman. PP is closed under intersection. Journal of Computer and System Sciences, To appear. Paper also appeared in Proceedings of 23rd STOC conference, 1991, pages 1-9. [5] D. Lapidot and A. Shamir. Fully parallelized multi prover protocols for NEXP-time. In Proceedings of the 32nd IEEE Symposium on Foundations of Computer Science, pages 13{18. IEEE, New York, [6] A. Razborov. Bounded Arithmetic and lower bounds in Boolean complexity. Feasible Mathematics II, To appear. [7] R. Smolensky. Algebraic methods in the theory of lower bounds for Boolean circuit complexity. In Proceedings of the 19th ACM Symposium on the Theory of Computing, pages 77{82. ACM, New York, [8] J. Tarui. Probabilistic polynomials, AC 0 functions and the polynomialtime hierarchy. Theoretical Computer Science A, 113:167{183, [9] S. Toda. PP is as hard as the polynomial-time hierarchy. SIAM Journal on Computing, 20(5):865{877, [10] S. Toda and M. Ogiwara. Counting classes are at least as hard as the polynomial-time hierarchy. SIAM Journal on Computing, 21(2):316{ 328, 1992.
7 [11] S. Toda and O. Watanabe. Polynomial time 1-turing reductions from #P H to #P. Theoretical Computer Science, page to appear, [12] L. Valiant. The complexity of computing the permanent. Theoretical Computer Science, 8:189{201, [13] A. Yao. On ACC and threshold circuits. In Proceedings of the 31st IEEE Symposium on Foundations of Computer Science, pages 619{631. IEEE, New York, 1990.
The Complexity of Approximating a Nonlinear Program
The Complexity of Approximating a Nonlinear Program Mihir Bellare Phillip Rogaway October 1993 Abstract We consider the problem of finding the maximum of a multivariate polynomial inside a convex polytope.
More informationLinearity and Group Homomorphism Testing / Testing Hadamard Codes
Title: Linearity and Group Homomorphism Testing / Testing Hadamard Codes Name: Sofya Raskhodnikova 1, Ronitt Rubinfeld 2 Affil./Addr. 1: Pennsylvania State University Affil./Addr. 2: Keywords: SumOriWork:
More informationA Brief Introduction to Property Testing
A Brief Introduction to Property Testing Oded Goldreich Abstract. This short article provides a brief description of the main issues that underly the study of property testing. It is meant to serve as
More informationHow to Prove a Theorem So No One Else Can Claim It
Proceedings of the International Congress of Mathematicians Berkeley, California, USA, 1986 How to Prove a Theorem So No One Else Can Claim It MANUEL BLUM Goldwasser, Micali, and Rackoff [GMR] define for
More informationLecture 2: Complexity Theory Review and Interactive Proofs
600.641 Special Topics in Theoretical Cryptography January 23, 2007 Lecture 2: Complexity Theory Review and Interactive Proofs Instructor: Susan Hohenberger Scribe: Karyn Benson 1 Introduction to Cryptography
More informationSuccinct Proofs for NP and Spooky Interactions
Succinct Proofs for NP and Spooky Interactions Cynthia Dwork Michael Langberg Moni Naor Kobbi Nissim Omer Reingold December 21, 2004 Abstract This paper investigates the possibility that any NP statement
More informationOracles Are Subtle But Not Malicious
Oracles Are Subtle But Not Malicious Scott Aaronson University of Waterloo Abstract Theoretical computer scientists have been debating the role of oracles since the 1970 s. This paper illustrates both
More informationThe Approximability of NP-hard Problems
The Approximability of NP-hard Problems Sanjeev Arora Princeton University 1 Introduction Many problems in combinatorial optimization are NP-hard (see [60]). This has forced researchers to explore techniques
More informationLecture 7: NP-Complete Problems
IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Basic Course on Computational Complexity Lecture 7: NP-Complete Problems David Mix Barrington and Alexis Maciel July 25, 2000 1. Circuit
More informationOutline Introduction Circuits PRGs Uniform Derandomization Refs. Derandomization. A Basic Introduction. Antonis Antonopoulos.
Derandomization A Basic Introduction Antonis Antonopoulos CoReLab Seminar National Technical University of Athens 21/3/2011 1 Introduction History & Frame Basic Results 2 Circuits Definitions Basic Properties
More informationAlgebrization: A New Barrier in Complexity Theory
Algebrization: A New Barrier in Complexity Theory Scott Aaronson MIT Avi Wigderson Institute for Advanced Study Abstract Any proof of P NP will have to overcome two barriers: relativization and natural
More informationThe Complexity of Testing Monomials in Multivariate Polynomials
Electronic Colloquium on Computational Complexity, Report No. 114 (2010) The Complexity of Testing Monomials in Multivariate Polynomials Zhixiang Chen and Bin Fu Department of Computer Science University
More informationTHE P VERSUS NP PROBLEM
THE P VERSUS NP PROBLEM STEPHEN COOK 1. Statement of the Problem The P versus NP problem is to determine whether every language accepted by some nondeterministic algorithm in polynomial time is also accepted
More informationP versus NP, and More
1 P versus NP, and More Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 If you have tried to solve a crossword puzzle, you know that it is much harder to solve it than to verify
More informationLecture 11: The Goldreich-Levin Theorem
COM S 687 Introduction to Cryptography September 28, 2006 Lecture 11: The Goldreich-Levin Theorem Instructor: Rafael Pass Scribe: Krishnaprasad Vikram Hard-Core Bits Definition: A predicate b : {0, 1}
More informationGuaranteed Slowdown, Generalized Encryption Scheme, and Function Sharing
Guaranteed Slowdown, Generalized Encryption Scheme, and Function Sharing Yury Lifshits July 10, 2005 Abstract The goal of the paper is to construct mathematical abstractions of different aspects of real
More informationQuantum Computability and Complexity and the Limits of Quantum Computation
Quantum Computability and Complexity and the Limits of Quantum Computation Eric Benjamin, Kenny Huang, Amir Kamil, Jimmy Kittiyachavalit University of California, Berkeley December 7, 2003 This paper will
More informationRelativized Separations of Worst-Case and Average-Case Complexities for NP
2011 26th Annual IEEE Conference on Computational Complexity Relativized Separations of Worst-Case and Average-Case Complexities for NP Russell Impagliazzo U. C. San Diego and IAS russell@cs.ucsd.edu Keywords-P
More informationOpen Problems in Quantum Information Processing. John Watrous Department of Computer Science University of Calgary
Open Problems in Quantum Information Processing John Watrous Department of Computer Science University of Calgary #1 Open Problem Find new quantum algorithms. Existing algorithms: Shor s Algorithm (+ extensions)
More informationNon-Black-Box Techniques In Crytpography. Thesis for the Ph.D degree Boaz Barak
Non-Black-Box Techniques In Crytpography Introduction Thesis for the Ph.D degree Boaz Barak A computer program (or equivalently, an algorithm) is a list of symbols a finite string. When we interpret a
More information2.1 Complexity Classes
15-859(M): Randomized Algorithms Lecturer: Shuchi Chawla Topic: Complexity classes, Identity checking Date: September 15, 2004 Scribe: Andrew Gilpin 2.1 Complexity Classes In this lecture we will look
More informationRevisiting a Limit on Efficient Quantum Computation
Revisiting a Limit on Efficient Quantum Computation Tarsem S. Purewal Jr. Department of Computer Science University of Georgia Athens, GA 30602 purewal@cs.uga.edu ABSTRACT In this paper, we offer an exposition
More informationCombinatorial PCPs with ecient veriers
Combinatorial PCPs with ecient veriers Or Meir Abstract The PCP theorem asserts the existence of proofs that can be veried by a verier that reads only a very small part of the proof. The theorem was originally
More informationAnalysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs
Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs Stavros Athanassopoulos, Ioannis Caragiannis, and Christos Kaklamanis Research Academic Computer Technology Institute
More informationThe Status of the P versus NP Problem
The Status of the P versus NP Problem Lance Fortnow Northwestern University 1. INTRODUCTION When Moshe Vardi asked me to write this piece for CACM, my first reaction was the article could be written in
More informationRemarks on the computational complexity of small universal Turing machines
Remarks on the computational complexity of small universal Turing machines Damien Woods School of Mathematics Boole Centre for Research in Informatics, University College Cork, Ireland http://www.bcri.ucc.ie/
More informationHow To Solve An Npa-Complete Problems With Quantum Computing And Chaotic Dynamics
CDMTCS Research Report Series A New Quantum Algorithm for NP-complete Problems Masanori Ohya Igor V. Volovich Science University of Tokyo Steklov Mathematical Institute CDMTCS-194 September 00 Centre for
More informationConstant-Round Interactive Proofs for Delegating Computation
Electronic Colloquium on Computational Complexity, Report No. 61 2016 Constant-Round Interactive Proofs for Delegating Computation Omer Reingold Samsung Research America Guy N. Rothblum Samsung Research
More informationComputational complexity theory
Computational complexity theory Goal: A general theory of the resources needed to solve computational problems What types of resources? Time What types of computational problems? decision problem Decision
More informationDiagonalization. Ahto Buldas. Lecture 3 of Complexity Theory October 8, 2009. Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach.
Diagonalization Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach. Ahto Buldas Ahto.Buldas@ut.ee Background One basic goal in complexity theory is to separate interesting complexity
More informationFactoring by Quantum Computers
Factoring by Quantum Computers Ragesh Jaiswal University of California, San Diego A Quantum computer is a device that uses uantum phenomenon to perform a computation. A classical system follows a single
More informationBeyond NP: The Work and Legacy of Larry Stockmeyer. Lance Fortnow University of Chicago
Beyond NP: The Work and Legacy of Larry Stockmeyer Lance Fortnow University of Chicago Larry Joseh Stockmeyer 1948 Born in Indiana 1974 MIT Ph.D. IBM Research at Yorktown and Almaden for most of his career
More informationWhich Problems Have Strongly Exponential Complexity? 1
Journal of Computer and System Sciences 63, 512 530 (2001) doi:10.1006/jcss.2001.1774, available online at http://www.idealibrary.com on Which Problems Have Strongly Exponential Complexity? 1 Russell Impagliazzo
More informationProof Systems that Take Advice
Proof Systems that Take Advice Olaf Beyersdorff 1, Johannes Köbler 2, and Sebastian Müller 2 1 Institut für Theoretische Informatik, Leibniz-Universität Hannover, Germany beyersdorff@thi.uni-hannover.de
More informationThe Status of the P versus NP Problem
doi:10.1145/ 1562164.1562186 It s one of the fundamental mathematical problems of our time, and its importance grows with the rise of powerful computers. By Lance Fortnow The Status of the P versus NP
More informationExact Polynomial-time Algorithm for the Clique Problem and P = NP for Clique Problem
xact Polynomial-time Algorithm for the Clique Problem and P = NP for Clique Problem Kanak Chandra Bora Department of Computer Science & ngineering Royal School of ngineering & Technology, Betkuchi, Guwahati-7810,
More information2 Preliminaries. 2.1 Functions and polynomials. rank of the2n2ncommunication matrixmfdefined by Mf(x;y)=f(x;y). The following relations are known:
Characterization of Non-Deterministic Quantum Query and Quantum Communication Complexity Ronald de Wolf Centrum voor Wiskunde en Informatica (CWI) Kruislaan 413 1098 SJ Amsterdam, the Netherlands rdewolf@cwi.nl
More informationComplexity Classes P and NP
Complexity Classes P and NP MATH 3220 Supplemental Presentation by John Aleshunas The cure for boredom is curiosity. There is no cure for curiosity Dorothy Parker Computational Complexity Theory In computer
More informationExperimental Analysis of Privacy-Preserving Statistics Computation
Experimental Analysis of Privacy-Preserving Statistics Computation Hiranmayee Subramaniam 1, Rebecca N. Wright 2, and Zhiqiang Yang 2 1 Stevens Institute of Technology graduate, hiran@polypaths.com. 2
More informationPrivate Information Retrieval
Private Information Retrieval Benny Chor Oded Goldreich Eyal Kushilevitz Madhu Sudan April 21, 1998 Abstract Publicly accessible databases are an indispensable resource for retrieving up to date information.
More informationPolynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range
THEORY OF COMPUTING, Volume 1 (2005), pp. 37 46 http://theoryofcomputing.org Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range Andris Ambainis
More informationLecture 4: AC 0 lower bounds and pseudorandomness
Lecture 4: AC 0 lower bounds and pseudorandomness Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: Jason Perry and Brian Garnett In this lecture,
More informationAlgebraic Computation Models. Algebraic Computation Models
Algebraic Computation Models Ζυγομήτρος Ευάγγελος ΜΠΛΑ 201118 Φεβρουάριος, 2013 Reasons for using algebraic models of computation The Turing machine model captures computations on bits. Many algorithms
More informationOn Rank vs. Communication Complexity
On Rank vs. Communication Complexity Noam Nisan Avi Wigderson Abstract This paper concerns the open problem of Lovász and Saks regarding the relationship between the communication complexity of a boolean
More informationSUBLIMINALFREE AUTHENTICATION AND SIGNATURE
SUBLIMINALFREE AUTHENTICATION AND SIGNATURE (Extended Abstract) Yvo Desmedt Dept. EE & CS, Univ. of Wisconsin - Milwaukee P.O. Box 784, WI 53201 Milwaukee, U.S.A. ABSTRACT Simmons [17] introduced the notion
More informationBreaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham Dan Boneh Omer Reingold Abstract The Diffie-Hellman key-exchange protocol may naturally be extended to k > 2
More informationA Working Knowledge of Computational Complexity for an Optimizer
A Working Knowledge of Computational Complexity for an Optimizer ORF 363/COS 323 Instructor: Amir Ali Ahmadi TAs: Y. Chen, G. Hall, J. Ye Fall 2014 1 Why computational complexity? What is computational
More informationETH Zurich. Email: stadler@inf.ethz.ch. participants such that only certain groups of them can recover it.
Publicly Veriable Secret Sharing Markus Stadler? Institute for Theoretical Computer Science ETH Zurich CH-8092 Zurich, Switzerland Email: stadler@inf.ethz.ch Abstract. A secret sharing scheme allows to
More informationHard Functions for Low-degree Polynomials over Prime Fields
0 Hard Functions for Low-degree Polynomials over Prime Fields Andrej Bogdanov, Department of Computer Science and Engineering and Institute for Theoretical Computer Science and Communications, Chinese
More informationMATHEMATICS: CONCEPTS, AND FOUNDATIONS Vol. III - Logic and Computer Science - Phokion G. Kolaitis
LOGIC AND COMPUTER SCIENCE Phokion G. Kolaitis Computer Science Department, University of California, Santa Cruz, CA 95064, USA Keywords: algorithm, Armstrong s axioms, complete problem, complexity class,
More informationSome Optimal Inapproximability Results
Some Optimal Inapproximability Results JOHAN HÅSTAD Royal Institute of Technology, Stockholm, Sweden Abstract. We prove optimal, up to an arbitrary ɛ>0, inapproximability results for Max-Ek-Sat for k 3,
More informationA Secure Protocol for the Oblivious Transfer (Extended Abstract) M. J. Fischer. Yale University. S. Micali Massachusetts Institute of Technology
J, Cryptoiogy (1996) 9:191-195 Joumol of CRYPTOLOGY O 1996 International Association for Cryptologic Research A Secure Protocol for the Oblivious Transfer (Extended Abstract) M. J. Fischer Yale University
More informationInfluences in low-degree polynomials
Influences in low-degree polynomials Artūrs Bačkurs December 12, 2012 1 Introduction In 3] it is conjectured that every bounded real polynomial has a highly influential variable The conjecture is known
More informationComplexity Theory. Jörg Kreiker. Summer term 2010. Chair for Theoretical Computer Science Prof. Esparza TU München
Complexity Theory Jörg Kreiker Chair for Theoretical Computer Science Prof. Esparza TU München Summer term 2010 Lecture 8 PSPACE 3 Intro Agenda Wrap-up Ladner proof and time vs. space succinctness QBF
More informationImproved Online/Offline Signature Schemes
Improved Online/Offline Signature Schemes Adi Shamir and Yael Tauman Applied Math. Dept. The Weizmann Institute of Science Rehovot 76100, Israel {shamir,tauman}@wisdom.weizmann.ac.il Abstract. The notion
More informationThe Parameterized Complexity of Short Computation and Factorization
The Parameterized Complexity of Short Computation and Factorization Liming Cai and Jianer Chen Department of Computer Science, Texas A & M University College Station, Texas 77843 U.S.A. Rodney G. Downey
More informationFunctions Computable with Nonadaptive Queries to NP Harry Buhrman CWI Amsterdam Jim Kadin y University ofmaine Thomas Thierauf z Universitat Ulm Abstract We study FP NP, the class of functions that can
More informationTR 98-032, Electronic Colloquium on Computational Complexity, June 1998. Uniform Generation of NP-witnesses using an NP-oracle Mihir Bellare æ Oded Goldreich y Erez Petrank z May 1998 Abstract A Uniform
More informationChapter 1. NP Completeness I. 1.1. Introduction. By Sariel Har-Peled, December 30, 2014 1 Version: 1.05
Chapter 1 NP Completeness I By Sariel Har-Peled, December 30, 2014 1 Version: 1.05 "Then you must begin a reading program immediately so that you man understand the crises of our age," Ignatius said solemnly.
More information1 Formulating The Low Degree Testing Problem
6.895 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 5: Linearity Testing Lecturer: Dana Moshkovitz Scribe: Gregory Minton and Dana Moshkovitz In the last lecture, we proved a weak PCP Theorem,
More informationOHJ-2306 Introduction to Theoretical Computer Science, Fall 2012 8.11.2012
276 The P vs. NP problem is a major unsolved problem in computer science It is one of the seven Millennium Prize Problems selected by the Clay Mathematics Institute to carry a $ 1,000,000 prize for the
More informationJohan Håstad. December 2015
Johan Håstad December 2015 1 Address School of Computer Science and Communication KTH Royal Institute of Technology 100 44 Stockholm, SWEDEN email:johanh@kth.se 2 Research Interests Theory of computation.
More informationAlternative machine models
Alternative machine models Computational complexity thesis: All reasonable computer models can simulate one another in polynomial time (i.e. P is robust or machine independent ). But the Turing machine
More informationIntroduction to Algorithms. Part 3: P, NP Hard Problems
Introduction to Algorithms Part 3: P, NP Hard Problems 1) Polynomial Time: P and NP 2) NP-Completeness 3) Dealing with Hard Problems 4) Lower Bounds 5) Books c Wayne Goddard, Clemson University, 2004 Chapter
More informationTesting Hereditary Properties of Non-Expanding Bounded-Degree Graphs
Testing Hereditary Properties of Non-Expanding Bounded-Degree Graphs Artur Czumaj Asaf Shapira Christian Sohler Abstract We study graph properties which are testable for bounded degree graphs in time independent
More informationThe New Prehistory. 1 This is an updated version of the chapter with this title that appeared on pages 359 376 of Optimization Stories,
A Brief History of NP-Completeness, 1954 2012 David S. Johnson Mathematics subject classification: 68-03, 68Q17, 68Q25, 68W25, 90C05, 90C22 Key words: NP-Completeness, Polynomial Time, Approximation Algorithms,
More informationEastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students
Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent
More informationA Secure and Efficient Conference Key Distribution System
********************** COVER PAGE ********************** A Secure and Efficient Conference Key Distribution System (Extended Abstract) Mike Burmester Department of Mathematics Royal Holloway University
More informationMatthias F.M. Stallmann Department of Computer Science North Carolina State University Raleigh, NC 27695-8206
Matthias F.M. Stallmann Department of Computer Science North Carolina State University Raleigh, NC 27695-8206 August, 1990 UNIFORM PLANAR EMBEDDING IS NP-COMPLETE* MATTHIAS F.M. STALLMANN Key Words. planar
More informationIntroduction to computer science
Introduction to computer science Michael A. Nielsen University of Queensland Goals: 1. Introduce the notion of the computational complexity of a problem, and define the major computational complexity classes.
More informationThe `Russian Roulette' problem: a probabilistic variant of the Josephus Problem
The `Russian Roulette' problem: a probabilistic variant of the Josephus Problem Joshua Brulé 2013 May 2 1 Introduction The classic Josephus problem describes n people arranged in a circle, such that every
More informationOlaf Beyersdorff. International Computer Science Symposium in Russia 2006
Institute of Computer Science Humboldt-University Berlin Germany Tuples from Proof Optimal Proof International Computer Science Symposium in Russia 2006 Disjoint NP-Pairs (Grollmann, Selman 88) (A, B)
More informationCourse Manual Automata & Complexity 2015
Course Manual Automata & Complexity 2015 Course code: Course homepage: Coordinator: Teachers lectures: Teacher exercise classes: Credits: X_401049 http://www.cs.vu.nl/~tcs/ac prof. dr. W.J. Fokkink home:
More informationIntroduction to Logic in Computer Science: Autumn 2006
Introduction to Logic in Computer Science: Autumn 2006 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today Now that we have a basic understanding
More informationCopyright by Alexander Alexandrovich Sherstov 2009
Copyright by Alexander Alexandrovich Sherstov 2009 The Dissertation Committee for Alexander Alexandrovich Sherstov certifies that this is the approved version of the following dissertation: Lower Bounds
More informationDecentralized Utility-based Sensor Network Design
Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA narayans@cs.usc.edu, bkrishna@usc.edu
More informationComputational Complexity: A Modern Approach. Draft of a book: Dated January 2007 Comments welcome!
i Computational Complexity: A Modern Approach Draft of a book: Dated January 2007 Comments welcome! Sanjeev Arora and Boaz Barak Princeton University complexitybook@gmail.com Not to be reproduced or distributed
More informationGenerating models of a matched formula with a polynomial delay
Generating models of a matched formula with a polynomial delay Petr Savicky Institute of Computer Science, Academy of Sciences of Czech Republic, Pod Vodárenskou Věží 2, 182 07 Praha 8, Czech Republic
More informationNP-Completeness and Cook s Theorem
NP-Completeness and Cook s Theorem Lecture notes for COM3412 Logic and Computation 15th January 2002 1 NP decision problems The decision problem D L for a formal language L Σ is the computational task:
More informationTutorial 8. NP-Complete Problems
Tutorial 8 NP-Complete Problems Decision Problem Statement of a decision problem Part 1: instance description defining the input Part 2: question stating the actual yesor-no question A decision problem
More informationNP-complete? NP-hard? Some Foundations of Complexity. Prof. Sven Hartmann Clausthal University of Technology Department of Informatics
NP-complete? NP-hard? Some Foundations of Complexity Prof. Sven Hartmann Clausthal University of Technology Department of Informatics Tractability of Problems Some problems are undecidable: no computer
More informationThe Challenger-Solver game: Variations on the theme of P =?NP
The Challenger-Solver game: Variations on the theme of P =?NP Yuri Gurevich Electrical Engineering and Computer Science Department University of Michigan, Ann Arbor, MI 48109, U.S.A. Logic in Computer
More information2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8]
Code No: R05220502 Set No. 1 1. (a) Describe the performance analysis in detail. (b) Show that f 1 (n)+f 2 (n) = 0(max(g 1 (n), g 2 (n)) where f 1 (n) = 0(g 1 (n)) and f 2 (n) = 0(g 2 (n)). [8+8] 2. (a)
More informationApproximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs
Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and Hing-Fung Ting 2 1 College of Mathematics and Computer Science, Hebei University,
More informationQuery Order and NP-Completeness 1 Jack J.Dai Department of Mathematics Iowa State University Ames, Iowa 50011 U.S.A. Jack H.Lutz Department of Computer Science Iowa State University Ames, Iowa 50011 U.S.A.
More informationAn Overview of Common Adversary Models
An Overview of Common Adversary Karl Palmskog palmskog@kth.se 2012-03-29 Introduction Requirements of Software Systems 1 Functional Correctness: partial, termination, liveness, safety,... 2 Nonfunctional
More informationNotes on Complexity Theory Last updated: August, 2011. Lecture 1
Notes on Complexity Theory Last updated: August, 2011 Jonathan Katz Lecture 1 1 Turing Machines I assume that most students have encountered Turing machines before. (Students who have not may want to look
More informationLecture 1: Course overview, circuits, and formulas
Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik
More informationThe Complexity of Generating and Checing Proofs of Membership Harry Buhrman CWI Amsterdam Thomas Thierauf y Universitat Ulm Abstract We consider the following questions: 1) Can one compute satisfying assignments
More informationSECRET sharing schemes were introduced by Blakley [5]
206 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 1, JANUARY 2006 Secret Sharing Schemes From Three Classes of Linear Codes Jin Yuan Cunsheng Ding, Senior Member, IEEE Abstract Secret sharing has
More informationCompetitive Analysis of On line Randomized Call Control in Cellular Networks
Competitive Analysis of On line Randomized Call Control in Cellular Networks Ioannis Caragiannis Christos Kaklamanis Evi Papaioannou Abstract In this paper we address an important communication issue arising
More informationLimits of Computational Differential Privacy in the Client/Server Setting
Limits of Computational Differential Privacy in the Client/Server Setting Adam Groce, Jonathan Katz, and Arkady Yerukhimovich Dept. of Computer Science University of Maryland {agroce, jkatz, arkady}@cs.umd.edu
More informationDefinition 11.1. Given a graph G on n vertices, we define the following quantities:
Lecture 11 The Lovász ϑ Function 11.1 Perfect graphs We begin with some background on perfect graphs. graphs. First, we define some quantities on Definition 11.1. Given a graph G on n vertices, we define
More informationThe Complexity of Online Memory Checking
The Complexity of Online Memory Checking Moni Naor Guy N. Rothblum Abstract We consider the problem of storing a large file on a remote and unreliable server. To verify that the file has not been corrupted,
More informationExponential time algorithms for graph coloring
Exponential time algorithms for graph coloring Uriel Feige Lecture notes, March 14, 2011 1 Introduction Let [n] denote the set {1,..., k}. A k-labeling of vertices of a graph G(V, E) is a function V [k].
More informationCNFSAT: Predictive Models, Dimensional Reduction, and Phase Transition
CNFSAT: Predictive Models, Dimensional Reduction, and Phase Transition Neil P. Slagle College of Computing Georgia Institute of Technology Atlanta, GA npslagle@gatech.edu Abstract CNFSAT embodies the P
More informationRustam Mubarakzjanov z. Abstract. We investigate the relationship between probabilistic and nondeterministic complexity
On BPP versus NP[coNP for Ordered Read-Once Branching Programs Farid Ablayev Marek Karpinski y Rustam Mubarakzjanov z Abstract We investigate the relationship between probabilistic and nondeterministic
More informationExtracting Kolmogorov Complexity with Applications to Dimension Zero-One Laws
Extracting Kolmogorov Complexity with Applications to Dimension Zero-One Laws Lance Fortnow Department of Computer Science University of Chicago fortnow@cs.uchicago.edu A. Pavan Department of Computer
More informationCycle transversals in bounded degree graphs
Electronic Notes in Discrete Mathematics 35 (2009) 189 195 www.elsevier.com/locate/endm Cycle transversals in bounded degree graphs M. Groshaus a,2,3 P. Hell b,3 S. Klein c,1,3 L. T. Nogueira d,1,3 F.
More informationComputational Soundness of Symbolic Security and Implicit Complexity
Computational Soundness of Symbolic Security and Implicit Complexity Bruce Kapron Computer Science Department University of Victoria Victoria, British Columbia NII Shonan Meeting, November 3-7, 2013 Overview
More information